{"title":"分析和分类新兴网络安全法规","authors":"Angelica Marotta, Stuart Madnick","doi":"10.1145/3757318","DOIUrl":null,"url":null,"abstract":"As cyber-attacks become more frequent, sophisticated, and impactful, governments worldwide are responding by introducing or proposing new cybersecurity regulations. This paper examines over 170 recent regulations and trends in cybersecurity across various regions, including the United States, Europe, and beyond. It identifies 17 key features in many of these regulations, which we have grouped into 5 categories, analyzes observed patterns, and proposes areas for improvement. This paper's primary objective is to significantly contribute to the cybersecurity compliance domain by helping researchers understand the structure of these regulations and helping organizations to assess and mitigate their cyber risk within an increasingly complex and regulated cybersecurity environment. Our findings provide valuable direction to those trying to navigate the flood of new cybersecurity regulations and the governments enacting new cybersecurity regulations.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"7 1","pages":""},"PeriodicalIF":28.0000,"publicationDate":"2025-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analyzing and Categorizing Emerging Cybersecurity Regulations\",\"authors\":\"Angelica Marotta, Stuart Madnick\",\"doi\":\"10.1145/3757318\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As cyber-attacks become more frequent, sophisticated, and impactful, governments worldwide are responding by introducing or proposing new cybersecurity regulations. This paper examines over 170 recent regulations and trends in cybersecurity across various regions, including the United States, Europe, and beyond. It identifies 17 key features in many of these regulations, which we have grouped into 5 categories, analyzes observed patterns, and proposes areas for improvement. This paper's primary objective is to significantly contribute to the cybersecurity compliance domain by helping researchers understand the structure of these regulations and helping organizations to assess and mitigate their cyber risk within an increasingly complex and regulated cybersecurity environment. Our findings provide valuable direction to those trying to navigate the flood of new cybersecurity regulations and the governments enacting new cybersecurity regulations.\",\"PeriodicalId\":50926,\"journal\":{\"name\":\"ACM Computing Surveys\",\"volume\":\"7 1\",\"pages\":\"\"},\"PeriodicalIF\":28.0000,\"publicationDate\":\"2025-08-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Computing Surveys\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1145/3757318\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Computing Surveys","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3757318","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Analyzing and Categorizing Emerging Cybersecurity Regulations
As cyber-attacks become more frequent, sophisticated, and impactful, governments worldwide are responding by introducing or proposing new cybersecurity regulations. This paper examines over 170 recent regulations and trends in cybersecurity across various regions, including the United States, Europe, and beyond. It identifies 17 key features in many of these regulations, which we have grouped into 5 categories, analyzes observed patterns, and proposes areas for improvement. This paper's primary objective is to significantly contribute to the cybersecurity compliance domain by helping researchers understand the structure of these regulations and helping organizations to assess and mitigate their cyber risk within an increasingly complex and regulated cybersecurity environment. Our findings provide valuable direction to those trying to navigate the flood of new cybersecurity regulations and the governments enacting new cybersecurity regulations.
期刊介绍:
ACM Computing Surveys is an academic journal that focuses on publishing surveys and tutorials on various areas of computing research and practice. The journal aims to provide comprehensive and easily understandable articles that guide readers through the literature and help them understand topics outside their specialties. In terms of impact, CSUR has a high reputation with a 2022 Impact Factor of 16.6. It is ranked 3rd out of 111 journals in the field of Computer Science Theory & Methods.
ACM Computing Surveys is indexed and abstracted in various services, including AI2 Semantic Scholar, Baidu, Clarivate/ISI: JCR, CNKI, DeepDyve, DTU, EBSCO: EDS/HOST, and IET Inspec, among others.